US20240242582A1 - Methods and systems for tracking an anti-theft tag beyond the retail space - Google Patents
Methods and systems for tracking an anti-theft tag beyond the retail space Download PDFInfo
- Publication number
- US20240242582A1 US20240242582A1 US18/407,940 US202418407940A US2024242582A1 US 20240242582 A1 US20240242582 A1 US 20240242582A1 US 202418407940 A US202418407940 A US 202418407940A US 2024242582 A1 US2024242582 A1 US 2024242582A1
- Authority
- US
- United States
- Prior art keywords
- item
- active radio
- radio tag
- item identifier
- location information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 65
- 230000004044 response Effects 0.000 claims abstract description 18
- 230000004913 activation Effects 0.000 claims abstract description 15
- 238000010295 mobile communication Methods 0.000 claims description 30
- 238000004891 communication Methods 0.000 claims description 18
- 230000003213 activating effect Effects 0.000 claims description 11
- 101100206389 Caenorhabditis elegans tag-124 gene Proteins 0.000 description 25
- 238000003860 storage Methods 0.000 description 15
- 238000013475 authorization Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 7
- 230000008569 process Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 238000012545 processing Methods 0.000 description 5
- 238000001514 detection method Methods 0.000 description 3
- 238000005259 measurement Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000003306 harvesting Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- NJPPVKZQTLUDBO-UHFFFAOYSA-N novaluron Chemical compound C1=C(Cl)C(OC(F)(F)C(OC(F)(F)F)F)=CC=C1NC(=O)NC(=O)C1=C(F)C=CC=C1F NJPPVKZQTLUDBO-UHFFFAOYSA-N 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000005672 electromagnetic field Effects 0.000 description 1
- 230000008713 feedback mechanism Effects 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 238000002372 labelling Methods 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000003550 marker Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/021—Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2451—Specific applications combined with EAS
- G08B13/2462—Asset location systems combined with EAS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/029—Location-based management or tracking services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/04—Large scale networks; Deep hierarchical networks
- H04W84/042—Public Land Mobile systems, e.g. cellular systems
Definitions
- the present disclosure relates to electronic tags and, and more particularly to methods and systems for tracking an anti-theft tag beyond the retail space.
- Retailers detect movement of goods using a security tag attached to the goods and sensors that detect the location of the security tag.
- a security system may include an exit system (e.g., a pedestal including a reader) that detects the presence of a tag.
- While such security systems are useful in detecting a surreptitious theft of an item, they cannot track the item once the tag has left the range of the readers. For example, gang shoplifting incidents known as organized retail crime (ORC) may involve the theft of multiple items by multiple people at the same time. While a security system may detect that tagged items have been stolen, the scale of such events often results in some of the items being removed from the retail location. The security system may provide information about which items were stolen.
- ORC organized retail crime
- the techniques described herein relate to a method including: detecting an unauthorized removal of an item tagged with an active radio tag associated with an item identifier; activating, in response to the unauthorized removal, tracking of the active radio tag, wherein after activation of the tracking, the active radio tag transmits the item identifier; collecting, at a database, the item identifier and location information indicating a location of the item when the item identifier was transmitted; and displaying the location information from the database for one or more items including the item.
- the techniques described herein relate to a method, wherein detecting the unauthorized removal includes: detecting movement of the active radio tag at an exit system; and determining that the active radio tag has not been deactivated.
- the techniques described herein relate to a method, wherein activating tracking of the active radio tag includes transmitting a request for the active radio tag to transmit the item identifier and the location information.
- the techniques described herein relate to a method, wherein activating tracking of the tag includes adding the item identifier to a set of tracked items.
- the techniques described herein relate to a method, wherein the active radio tag is configured to transmit the item identifier prior to the unauthorized removal and until deactivated at a point of sale.
- the techniques described herein relate to a method, wherein the active radio tag is configured to transmit the item identifier to a mobile communications device via a short range wireless communications protocol.
- the techniques described herein relate to a method, wherein the location information is a location of the mobile communications device provided from the mobile communications device to the database.
- the techniques described herein relate to a method, wherein the active radio tag is configured to transmit the item identifier to the database via a radio access network.
- the techniques described herein relate to a method, wherein displaying the tag location information from the database for one or more items including the item includes selecting the tag location information from the database based on one or more of: a value associated with the item identifier; a number of items with location information within a geographic area; or a user selected item.
- the techniques described herein relate to a system including: an active radio tag associated with an item identifier and attached to a corresponding item; a point of sale system configured to deactivate the active radio tag in response to a purchase of the corresponding item; an exit system configured to detect the active radio tag within a coverage areas and detect an unauthorized removal of the corresponding item; and at least one computer device including a memory storing computer-executable instructions and a processor configured to execute the computer-executable instructions to: activate, in response to the unauthorized removal, tracking of the active radio tag, wherein after activation of the tracking, the active radio tag transmits the item identifier; collect, at a database, the item identifier and location information indicating a location of the item when the item identifier was transmitted; and display the location information from the database for one or more items including the item.
- the techniques described herein relate to a non-transitory computer-readable medium storing computer-executable instructions, that when executed by one or more processors of a computing device, cause the computing device to: detect an unauthorized removal of an item tagged with an active radio tag associated with an item identifier; activate, in response to the unauthorized removal, tracking of the active radio tag, wherein after activation of the tracking, the active radio tag transmits the item identifier; collect, at a database, the item identifier and location information indicating a location of the item when the item identifier was transmitted; and display the location information from the database for one or more items including the item
- FIG. 1 is a schematic diagram of an example retail location including a first example of a security system.
- FIG. 2 is a schematic diagram of example communications for transmitting an item identifier.
- FIG. 3 is a diagram of an example database of item information.
- FIG. 4 is a diagram of an example computer system implementing a security system including an item tracking application, in accordance with an implementation of the present disclosure.
- FIG. 5 is a flowchart of an example method of tracking items, in accordance with an implementation of the present disclosure.
- FIG. 6 is a schematic block diagram of an example computer device, in accordance with an implementation of the present disclosure.
- the present disclosure provides systems and methods for tracking an anti-theft tag beyond a retail environment.
- the disclosure provides for configuration of active radio tags and a system for activating or deactivating such tags to track items that have left a retail location.
- EAS Electronic Article Surveillance
- a detection system is configured at an exit from the protected area, which comprises one or more transmitters and antennas (“pedestals”) capable of generating an electromagnetic field across the exit, known as the “interrogation zone.”
- Propedals transmitters and antennas
- Articles to be protected are tagged with a security tag (such as an RFID and/or an acousto-magnetic (AM) tag), also known as an EAS marker, that, when active, generates a response signal when passed through this interrogation zone.
- An antenna and receiver in the same or another “pedestal” detects this response signal and generates an alarm.
- an alarm may be insufficient to stop theft of an item.
- a thief may evade security personnel or law enforcement officers. Further, confronting a thief at the retail location may escalate the situation and possibly put customers at risk.
- the present disclosure provides a security system and methods for tracking tagged items beyond a retail location.
- Items may be tagged with an active radio tag that is configured to transmit an item identifier and/or location of the item.
- the active radio tag may utilize short range wireless communications to transmit the item identifier to a mobile communications device, which can forward the information to a database, or the active radio tag may transmit the item identifier to the database via a radio access network.
- the database may collect item identifiers and location information.
- the system may display a location of the tracked item, for example, to security personnel or law enforcement officers.
- an example retail location 100 includes multiple regions where tagged products may be located.
- the retail location 100 may include an open display area 110 , a front end 112 , aisles 114 , and a security room 118 .
- Customers 130 may be located within the different regions.
- Workers 132 may be stationed at locations such as check out registers and the security room 118 .
- the workers 132 may operate a point of sale (POS) system 134 .
- the POS system 134 may include self-service kiosks or a mobile application.
- RFID radio frequency identification
- retailers e.g., consumer products and apparel retailers
- RFID radio frequency identification
- retailers are able to reduce the amount of time that the store employees spend counting the inventory (e.g., manually counting inventory that is on the floor and in stock room), as well as increase merchandise visibility within each store, thereby enabling shoppers in the store and online to find what they seek.
- RFID uses radio waves to read and capture information stored on a tag attached to an object such as a good, product, or merchandise.
- RFID tags may be used with a security system to detect inventory changes and possible loss events. For example, RFID tags may be read by an exit system 140 to determine whether a tagged item 122 is leaving the retail location.
- a tag (e.g., tag 124 ) can include an active radio tag 154 .
- the active radio tag 154 may be configured to transmit an item identifier and/or location of the active radio tag 154 .
- the item identifier may be a unique code such as a serial number that identifier the active radio tag 154 .
- the item identifier may be associated with an item, for example, when the item is tagged.
- the item 122 may be tagged with the tag 124 during manufacture or packaging in a process known as source labeling or source tagging. Accordingly, the item identifier and/or tag 124 may be used to track the item throughout a distribution chain.
- the active radio tag may be configured to transmit the item identifier prior to any unauthorized removal and until deactivated at a point of sale.
- the active radio tag 154 may include a power source 152 and an antenna 156 .
- the power source 152 may be a battery.
- the power source 152 may be charged via energy harvesting from an environment (e.g., solar or RF energy harvesting).
- the active radio tag 154 may include an RFID tag 150 (e.g., an electronic article surveillance (EAS) tag).
- the RFID tag 150 may be read from up to several feet away by a reader and does not need to be within direct line-of-sight of the reader to be tracked.
- EAS electronic article surveillance
- An RFID system may be made up of two parts: a tag or label (e.g., RFID tag 150 ) and a reader (e.g., exit system 140 ).
- RFID tags 150 (which may also be referred to as EPC tags or labels) are embedded with an RFID transmitter and a receiver.
- the RFID component on the tags may include a microchip that stores and processes information, and an antenna to receive and transmit signals.
- the EPC tag may further contain the specific serial number for each specific object (e.g., an electronic product code (EPC)).
- the EPC may also be embedded in the active radio tag 154 .
- the tag 124 may include multiple memory banks such as a reserved memory, EPC memory, tag identification (TID) memory, and user memory.
- the reserved memory bank may include an access password and a kill password.
- the EPC memory may include the EPC, a protocol control, and a cyclic redundancy check value.
- the TID memory may include a tag identification.
- the user memory may store custom data
- the POS system 134 may be configured to deactivate a tag 124 upon purchase of the tagged item 122 .
- the POS system 134 may deactivate the tag 124 itself, for example, using the kill password to prevent the tag 124 from transmitting.
- the POS system 134 may deactivate the tag 124 within the security system 102 , for example, by setting a status of the tag 124 to deactivated.
- a two-way radio transmitter-receiver called an interrogator or reader emits a signal to the EPC tag using the antenna (e.g., internal antennas).
- the exit system 140 may apply filtering to indicate what memory bank the EPC tag 124 should use to respond to the emitted signal.
- the EPC tag 124 may respond with the information (e.g., EPC value or serial number) written in the memory bank.
- the EPC tag data set may include any information stored on the EPC tag 124 as well as information about reading the EPC tag 124 .
- the EPC tag data set may include: a timestamp, a location, a signal transmission power, a received signal strength indication (RSSI), and an identifier of the RFID reader (e.g., exit system 140 ).
- RSSI received signal strength indication
- the terms, the EPC tag and RFID tag may be used interchangeably.
- the EPC tag 124 may be a passive tag or a battery powered EPC tag.
- a passive RFID tag may use the radio wave energy of the RFID interrogator or receiver to relay the stored information back to the interrogator.
- a battery powered EPC tag 124 may be embedded with a small battery that powers the relay of information.
- the security system 102 may include an exit system 140 and an item-tracking system 160 .
- the exit system 140 may include multiple sensors 142 located near exits 144 .
- the example retail location 100 may include two exits 144 that are relatively narrow.
- the sensors 142 may be located on each side of the exits 144 .
- the sensors 142 may include at least one RFID reader including an antenna that generates a tag detection field 146 .
- the sensors 142 may be configured (e.g., by setting a power level) such that the tag detection fields 146 cover the exits 144 to detect tags moving through the exits.
- the sensors 142 are illustrated as pedestals adjacent the exits 144 , sensors 142 may be located on the floor and/or the ceiling.
- the sensors 142 may include additional sensors that may produce measurements other than RF measurements.
- the sensors 142 may include infrared (IR) sensors, inertial sensors, magnetic sensors, or cameras.
- the item-tracking system 160 may be a computer device programmed to manage tag data based on signals received from the tags 124 , the POS system 134 , and the exit system 140 .
- the item-tracking system 160 may be, for example, any mobile or fixed computer device including but not limited to a computer server, desktop or laptop or tablet computer, a cellular telephone, a personal digital assistant (PDA), a handheld device, any other computer device having wired and/or wireless connection capability with one or more other devices, or any other type of computerized device.
- the item-tracking system 160 may be located separately from the retail location 100 .
- the item-tracking system 160 or component thereof may be hosted on a server or datacenter of a cloud network and communicate with components of the security system 102 at the retail location 100 .
- the item-tracking system 160 includes an authorization component 162 configured to deactivate a tag 124 upon purchase of the tagged item 122 .
- the authorization component 162 may be configured to detect an unauthorized removal of an item tagged with an active radio tag associated with an item identifier. For instance, the authorization component 162 may receive a signal from the exit system 140 indicating movement of the tag 124 at an exit system. The authorization component 162 may detect unauthorized removal of the item 122 when the active radio tag 154 is not deactivated and movement of the active radio tag 154 is detected.
- the item-tracking system 160 may include an activation component 164 configured to activate, in response to the unauthorized removal, tracking of the active radio tag.
- the item-tracking system 160 may include a tracking component 166 configured to collect, at a database, the item identifier and location information indicating a location of the item when the item identifier was transmitted.
- the item-tracking system 160 may include a display component 168 configured to display the location information from the database for one or more items including the item.
- the display component may be an application that presents a graphical user interface on a computer display such as a monitor.
- the active radio tag 154 may transmit at least an identifier of the tag 124 in an environment 200 outside of the retail location 100 .
- the tag 124 and/or active radio tag 154 may include a global positioning system (GPS) receiver configured to determine a location of the tag 124 .
- GPS global positioning system
- the active radio tag 154 may transmit the location of the tag 124 .
- the active radio tag 154 may transmit the item identifier and/or tag location to a mobile communications device 210 via a short range communication protocol.
- the mobile communications device 210 may be a mobile phone, tablet, personal computer, laptop computer, etc.
- the mobile communications device 210 may be configured to receive the item identifier and/or tag location from any tag 124 .
- the mobile communications device 210 may participate in a Find My Device system.
- the mobile communications device 210 may receive a message (e.g., via BLUETOOTH) and forward the item identifier and/or tag location to the database 170 via a radio access network 220 .
- the mobile communications device 210 may add a location of the mobile device to the item identifier received from the active radio tag 154 .
- the mobile communications device 210 may detect the location based on a global navigational satellite system (GNSS) such as the global positioning system (GPS) or based on local wireless networks.
- GNSS global navigational satellite system
- GPS global positioning system
- the active radio tag 154 may transmit the item identifier and/or tag location to the database 170 via a radio access network 220 .
- the active radio tag 154 may connect to the radio access network 220 via a base station.
- the active radio tag 154 may transmit an internet protocol (IP) packet including the item identifier and/or tag location to the database 170 .
- IP internet protocol
- the active radio tag 154 may detect the location based on a GNSS such as GPS or based on local wireless networks and/or access points of the radio access network 220 .
- FIG. 3 illustrates an example configuration 300 of the database 170 .
- the configuration 300 may define a schema for storing tag information for tracking items.
- the configuration 300 may include an item identifier 310 , a status 312 , an item class 314 , a value 316 , and location events 318 .
- the location events 318 may be a separate structure such as a table that stores a time 320 , coordinates 322 , and signal type 324 .
- the item identifier 310 may be the unique code stored in the tag 124 (e.g., an EPC code).
- the status 312 may indicate whether tracking is activated or deactivated for the tag 124 .
- the item class 314 may provide information about the item associated with the tag such as a product stock keeping unit (SKU), manufacturer, legal owner, etc.
- the value 316 may indicate a value of the item such as a monetary value or a value category (e.g., high, medium, low).
- Each location event 318 may correspond to a transmission from the active radio tag 154 .
- the time 320 may indicate a time that the active radio tag 154 transmitted the item identifier 310 .
- the coordinates 322 may indicate the location of the active radio tag 154 at the time of the transmission. In some implementations, the coordinates 322 may correspond to the location of the mobile communications device 210 that received the item identifier 310 via a short range wireless communication protocol.
- the signal type 324 may indicates how the item identifier 310 was received (e.g., via mobile communications device 210 or radio access network 220 ).
- an example item-tracking system 160 may be implemented as a computer device 440 configured to execute an item-tracking application 460 .
- the computer device 440 may include a central processing unit (CPU) 442 including one or more processors that, individually or in combination, execute instructions stored in memory 444 .
- the CPU 442 may execute an operating system 452 and one or more applications 454 , which may include the item-tracking application 460 .
- the computer device 440 may include a storage device 446 for storing data (e.g., POS system events and exit system measurements).
- the computer device 440 may also include a network interface 448 for communication with external devices via a network.
- the computer device 440 may communicate with the POS system 134 and/or the exit system 140 .
- the computer device 440 may optionally include a display 450 .
- the display 450 may be, for example, a computer monitor and/or a touch-screen.
- the display 450 may provide information to an operator and allow the operator to configure the computer device 440 .
- Memory 444 may be configured for storing data and/or computer-executable instructions defining and/or associated with an operating system 452 and/or application 454 , and CPU 442 may execute operating system 452 and/or application 454 .
- Memory 444 may represent one or more hardware memory devices accessible to computer device 440 .
- An example of memory 444 can include, but is not limited to, a type of memory usable by a computer, such as random access memory (RAM), read only memory (ROM), tapes, magnetic discs, optical discs, volatile memory, non-volatile memory, and any combination thereof.
- Memory 444 may store local versions of applications being executed by CPU 442 .
- the memory 444 may include a storage device, which may be a non-volatile memory.
- the CPU 442 may include one or more processors for executing instructions.
- An example of CPU 442 can include, but is not limited to, any processor specially programmed as described herein, including a controller, microcontroller, application specific integrated circuit (ASIC), field programmable gate array (FPGA), system on chip (SoC), or other programmable logic or state machine.
- the CPU 442 may include other processing components such as an arithmetic logic unit (ALU), registers, and a control unit.
- the CPU 442 may include multiple cores and may be able to process different sets of instructions and/or data concurrently using the multiple cores to execute multiple threads.
- the operating system 452 may include instructions (such as applications 454 ) stored in memory 444 and executable by the CPU 442 .
- the applications 454 may include the item-tracking application 460 configured to track items that have been removed from the retail location 100 without authorization.
- the item-tracking application 460 may include the authorization component 162 , the activation component 164 , the tracking component 166 , and the display component 168 .
- an example method 500 tracks items that have been removed from the retail location 100 without authorization.
- method 500 may be performed by the item-tracking system 160 and/or the item-tracking application 460 on the computer device 440 .
- Optional blocks are shown with dashed lines.
- the method 500 includes detecting an unauthorized removal of an item tagged with an active radio tag associated with an item identifier.
- the item-tracking system 160 and/or the authorization component 162 may detect an unauthorized removal of an item 122 tagged with an active radio tag 154 associated with an item identifier 310 .
- the block 510 may optionally include, at sub-block 512 , detecting movement of the active radio tag 154 at an exit system; and, at sub-block 514 , determining that the active radio tag 154 has not been deactivated.
- the method 500 includes activating, in response to the unauthorized removal, tracking of the active radio tag.
- the active radio tag 154 transmits the item identifier 310 .
- the item-tracking system 160 and/or the activation component 164 may activate, in response to the unauthorized removal, tracking of the active radio tag 154 .
- the block 520 may optionally include transmitting a request for the active radio tag 154 to transmit the item identifier and the location information.
- the block 520 may optionally include adding the item identifier 310 to a set of tracked items (e.g., in database 170 ).
- the method 500 includes collecting, at a database, the item identifier and location information indicating a location of the item when the item identifier was transmitted.
- the item-tracking system 160 and/or the tracking component 166 may collect, at the database 170 , the item identifier 310 and location information (e.g., location events 318 ) indicating a location of the item when the item identifier was transmitted.
- the active radio tag 154 is configured to transmit the item identifier to a mobile communications device 210 via a short range wireless communications protocol.
- the item-tracking system 160 and/or the tracking component 166 may receive the item identifier from the mobile communications device 210 .
- the location information may be a location of the mobile communications device 210 provided from the mobile communications device to the database.
- the active radio tag 154 is configured to transmit the item identifier to the database via a radio access network 220 .
- the method 500 includes displaying the location information from the database for one or more items including the item.
- the item-tracking system 160 and/or the display component 168 may display the location information (e.g., location events 318 ) from the database 170 for one or more items including the item 122 on the display 450 .
- the block 540 may optionally include selecting the tag location information from the database based on one or more of: a value 316 associated with the item identifier; a number of items with location information within a geographic area; or a user selected item.
- computer device 440 may include processor 48 for carrying out processing functions associated with one or more of components and functions described herein.
- processor 48 can include a single or multiple set of processors or multi-core processors.
- processor 48 can be implemented as an integrated processing system and/or a distributed processing system.
- processor 48 may include CPU 442 .
- computer device 440 may include memory 50 for storing instructions executable by the processor 48 for carrying out the functions described herein.
- memory 50 may include memory 444 .
- the memory 50 may include instructions for executing the item-tracking application 460 .
- computer device 440 may include a communications component 52 that provides for establishing and maintaining communications with one or more parties utilizing hardware, software, and services as described herein.
- Communications component 52 may carry communications between components on computer device 440 , as well as between computer device 440 and external devices, such as devices located across a communications network and/or devices serially or locally connected to computer device 440 .
- communications component 52 may include one or more buses, and may further include transmit chain components and receive chain components associated with a transmitter and receiver, respectively, operable for interfacing with external devices.
- computer device 440 may include a data store 54 , which can be any suitable combination of hardware and/or software, that provides for mass storage of information, databases, and programs employed in connection with implementations described herein.
- data store 54 may be a data repository for operating system 452 and/or applications 454 .
- the data store may include memory 444 and/or storage device 446 .
- Computer device 440 may also include a user interface component 56 operable to receive inputs from a user of computer device 440 and further operable to generate outputs for presentation to the user.
- User interface component 56 may include one or more input devices, including but not limited to a keyboard, a number pad, a mouse, a touch-sensitive display, a digitizer, a navigation key, a function key, a microphone, a voice recognition component, any other mechanism capable of receiving an input from a user, or any combination thereof.
- user interface component 56 may include one or more output devices, including but not limited to a display, a speaker, a haptic feedback mechanism, a printer, any other mechanism capable of presenting an output to a user, or any combination thereof.
- user interface component 56 may transmit and/or receive messages corresponding to the operation of operating system 452 and/or applications 454 .
- processor 48 may execute operating system 452 and/or applications 454 , and memory 50 or data store 54 may store them.
- a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer.
- an application running on a computer device and the computer device can be a component.
- One or more components can reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers.
- these components can execute from various computer readable media having various data structures stored thereon.
- the components may communicate by way of local and/or remote processes such as in accordance with a signal having one or more data packets, such as data from one component interacting with another component in a local system, distributed system, and/or across a network such as the Internet with other systems by way of the signal.
- a signal having one or more data packets, such as data from one component interacting with another component in a local system, distributed system, and/or across a network such as the Internet with other systems by way of the signal.
- the term “or” is intended to mean an inclusive “or” rather than an exclusive “or.” That is, unless specified otherwise, or clear from the context, the phrase “X employs A or B” is intended to mean any of the natural inclusive permutations. That is, the phrase “X employs A or B” is satisfied by any of the following instances: X employs A; X employs B; or X employs both A and B.
- the articles “a” and “an” as used in this application and the appended claims should generally be construed to mean “one or more” unless specified otherwise or clear from the context to be directed to a singular form.
- a method comprising: detecting an unauthorized removal of an item tagged with an active radio tag associated with an item identifier; activating, in response to the unauthorized removal, tracking of the active radio tag, wherein after activation of the tracking, the active radio tag transmits the item identifier; collecting, at a database, the item identifier and location information indicating a location of the item when the item identifier was transmitted; and displaying the location information from the database for one or more items including the item.
- detecting the unauthorized removal comprises: detecting movement of the active radio tag at an exit system; and determining that the active radio tag has not been deactivated.
- Clause 3 The method of clause 1 or 2, wherein activating tracking of the active radio tag comprises transmitting a request for the active radio tag to transmit the item identifier and the location information.
- Clause 4 The method of any of clauses 1-3, wherein activating tracking of the tag comprises adding the item identifier to a set of tracked items.
- Clause 5 The method of any of clauses 1-4, wherein the active radio tag is configured to transmit the item identifier prior to the unauthorized removal and until deactivated at a point of sale.
- Clause 6 The method of any of clauses 1-5, wherein the active radio tag is configured to transmit the item identifier to a mobile communications device via a short range wireless communications protocol.
- Clause 8 The method of any of clauses 1-7 wherein the active radio tag is configured to transmit the item identifier to the database via a radio access network.
- Clause 9 The method of any of clauses 1-8, wherein displaying the tag location information from the database for one or more items including the item comprises selecting the tag location information from the database based on one or more of: a value associated with the item identifier; a number of items with location information within a geographic area; or a user selected item.
- a system comprising: an active radio tag associated with an item identifier and attached to a corresponding item; a point of sale system configured to deactivate the active radio tag in response to a purchase of the corresponding item; an exit system configured to detect the active radio tag within a coverage areas and detect an unauthorized removal of the corresponding item; and at least one computer device including a memory storing computer-executable instructions and a processor configured to execute the computer-executable instructions to: activate, in response to the unauthorized removal, tracking of the active radio tag, wherein after activation of the tracking, the active radio tag transmits the item identifier; collect, at a database, the item identifier and location information indicating a location of the item when the item identifier was transmitted; and display the location information from the database for one or more items including the item.
- Clause 11 The system of clause 10, wherein to detect the unauthorized removal, the at least one computer device is configured to: detect movement of the active radio tag at an exit system; and determine that the active radio tag has not been deactivated.
- Clause 12 The system of clause 10 or 11, wherein to activate tracking of the active radio tag, the at least one computer device is configured to transmit a request for the active radio tag to transmit the item identifier and the location information.
- Clause 13 The system of any of clauses 10-12, wherein to activate tracking of the active radio tag, the at least one computer device is configured to add the item identifier to a set of tracked items.
- Clause 14 The system of any of clauses 10-13, wherein the active radio tag is configured to transmit the item identifier prior to the unauthorized removal and until deactivated at a point of sale.
- Clause 15 The system of any of clauses 10-14, wherein the active radio tag is configured to transmit the item identifier to a mobile communications device via a short range wireless communications protocol.
- Clause 17 The system of any of clauses 10-16, wherein the active radio tag is configured to transmit the item identifier to the database via a radio access network.
- Clause 18 The system of any of clauses 10-17, wherein to display the tag location information from the database for one or more items including the item, the at least one computing device is configured to select the tag location information from the database based on one or more of: a value associated with the item identifier; a number of items with location information within a geographic area; or a user selected item.
- a non-transitory computer-readable medium storing computer-executable instructions, that when executed by one or more processors of a computing device, cause the computing device to: detect an unauthorized removal of an item tagged with an active radio tag associated with an item identifier; activate, in response to the unauthorized removal, tracking of the active radio tag, wherein after activation of the tracking, the active radio tag transmits the item identifier; collect, at a database, the item identifier and location information indicating a location of the item when the item identifier was transmitted; and display the location information from the database for one or more items including the item.
- Clause 20 The non-transitory computer-readable medium of clause 19, further comprising instructions to perform the method of any of clauses 2-9.
- DSP digital signal processor
- ASIC application specific integrated circuit
- FPGA field programmable gate array
- a general-purpose processor may be a microprocessor, but, in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine.
- a processor may also be implemented as a combination of computer devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration. Additionally, at least one processor may comprise one or more components operable to perform one or more of the steps and/or actions described above.
- a software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, a hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
- An exemplary storage medium may be coupled to the processor, such that the processor can read information from, and write information to, the storage medium.
- the storage medium may be integral to the processor.
- the processor and the storage medium may reside in an ASIC. Additionally, the ASIC may reside in a user terminal.
- processor and the storage medium may reside as discrete components in a user terminal. Additionally, in some implementations, the steps and/or actions of a method or procedure may reside as one or any combination or set of codes and/or instructions on a machine readable medium and/or computer readable medium, which may be incorporated into a computer program product.
- the functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored or transmitted as one or more instructions or code on a computer-readable medium.
- Computer-readable media includes computer storage media. Non-transitory computer-readable media excludes transitory signals.
- a storage medium may be any available media that can be accessed by a computer.
- such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
- Disk and disc includes compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk and Blu-ray disc where disks usually reproduce data magnetically, while discs usually reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Automation & Control Theory (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Electromagnetism (AREA)
- General Physics & Mathematics (AREA)
- Burglar Alarm Systems (AREA)
Abstract
Examples described herein generally relate to a system and method for tracking items. The system may detect an unauthorized removal of an item tagged with an active radio tag associated with an item identifier. The system may activate, in response to the unauthorized removal, tracking of the active radio tag, wherein after activation of the tracking, the active radio tag transmits the item identifier. The system may collect, at a database, the item identifier and location information indicating a location of the item when the item identifier was transmitted. The system may display the location information from the database for one or more items including the item.
Description
- This application claims priority to U.S. Provisional Application No. 63/479,887 titled “METHODS AND SYSTEMS FOR TRACKING AN ANTI-THEFT TAG BEYOND THE RETAIL SPACE,” filed Jan. 13, 2023, which is assigned to the assignee hereof, and incorporated herein by reference in its entirety.
- The present disclosure relates to electronic tags and, and more particularly to methods and systems for tracking an anti-theft tag beyond the retail space.
- Retailers detect movement of goods using a security tag attached to the goods and sensors that detect the location of the security tag. A security system may include an exit system (e.g., a pedestal including a reader) that detects the presence of a tag.
- While such security systems are useful in detecting a surreptitious theft of an item, they cannot track the item once the tag has left the range of the readers. For example, gang shoplifting incidents known as organized retail crime (ORC) may involve the theft of multiple items by multiple people at the same time. While a security system may detect that tagged items have been stolen, the scale of such events often results in some of the items being removed from the retail location. The security system may provide information about which items were stolen.
- Thus, there is a need in the art for improvements in system for tracking security tags. In particular, there is a need for systems and methods for tracking an anti-theft tag beyond a retail space.
- The following presents a simplified summary of one or more implementations of the present disclosure in order to provide a basic understanding of such implementations. This summary is not an extensive overview of all contemplated implementations, and is intended to neither identify key or critical elements of all implementations nor delineate the scope of any or all implementations. Its sole purpose is to present some concepts of one or more implementations of the present disclosure in a simplified form as a prelude to the more detailed description that is presented later.
- In some aspects, the techniques described herein relate to a method including: detecting an unauthorized removal of an item tagged with an active radio tag associated with an item identifier; activating, in response to the unauthorized removal, tracking of the active radio tag, wherein after activation of the tracking, the active radio tag transmits the item identifier; collecting, at a database, the item identifier and location information indicating a location of the item when the item identifier was transmitted; and displaying the location information from the database for one or more items including the item.
- In some aspects, the techniques described herein relate to a method, wherein detecting the unauthorized removal includes: detecting movement of the active radio tag at an exit system; and determining that the active radio tag has not been deactivated.
- In some aspects, the techniques described herein relate to a method, wherein activating tracking of the active radio tag includes transmitting a request for the active radio tag to transmit the item identifier and the location information.
- In some aspects, the techniques described herein relate to a method, wherein activating tracking of the tag includes adding the item identifier to a set of tracked items.
- In some aspects, the techniques described herein relate to a method, wherein the active radio tag is configured to transmit the item identifier prior to the unauthorized removal and until deactivated at a point of sale.
- In some aspects, the techniques described herein relate to a method, wherein the active radio tag is configured to transmit the item identifier to a mobile communications device via a short range wireless communications protocol.
- In some aspects, the techniques described herein relate to a method, wherein the location information is a location of the mobile communications device provided from the mobile communications device to the database.
- In some aspects, the techniques described herein relate to a method, wherein the active radio tag is configured to transmit the item identifier to the database via a radio access network.
- In some aspects, the techniques described herein relate to a method, wherein displaying the tag location information from the database for one or more items including the item includes selecting the tag location information from the database based on one or more of: a value associated with the item identifier; a number of items with location information within a geographic area; or a user selected item.
- In some aspects, the techniques described herein relate to a system including: an active radio tag associated with an item identifier and attached to a corresponding item; a point of sale system configured to deactivate the active radio tag in response to a purchase of the corresponding item; an exit system configured to detect the active radio tag within a coverage areas and detect an unauthorized removal of the corresponding item; and at least one computer device including a memory storing computer-executable instructions and a processor configured to execute the computer-executable instructions to: activate, in response to the unauthorized removal, tracking of the active radio tag, wherein after activation of the tracking, the active radio tag transmits the item identifier; collect, at a database, the item identifier and location information indicating a location of the item when the item identifier was transmitted; and display the location information from the database for one or more items including the item.
- In some aspects, the techniques described herein relate to a non-transitory computer-readable medium storing computer-executable instructions, that when executed by one or more processors of a computing device, cause the computing device to: detect an unauthorized removal of an item tagged with an active radio tag associated with an item identifier; activate, in response to the unauthorized removal, tracking of the active radio tag, wherein after activation of the tracking, the active radio tag transmits the item identifier; collect, at a database, the item identifier and location information indicating a location of the item when the item identifier was transmitted; and display the location information from the database for one or more items including the item
- Additional advantages and novel features relating to implementations of the present disclosure will be set forth in part in the description that follows, and in part will become more apparent to those skilled in the art upon examination of the following or upon learning by practice thereof.
- In the drawings:
-
FIG. 1 is a schematic diagram of an example retail location including a first example of a security system. -
FIG. 2 is a schematic diagram of example communications for transmitting an item identifier. -
FIG. 3 is a diagram of an example database of item information. -
FIG. 4 is a diagram of an example computer system implementing a security system including an item tracking application, in accordance with an implementation of the present disclosure. -
FIG. 5 is a flowchart of an example method of tracking items, in accordance with an implementation of the present disclosure. -
FIG. 6 is a schematic block diagram of an example computer device, in accordance with an implementation of the present disclosure. - The present disclosure provides systems and methods for tracking an anti-theft tag beyond a retail environment. The disclosure provides for configuration of active radio tags and a system for activating or deactivating such tags to track items that have left a retail location.
- Electronic Article Surveillance (EAS) systems are commonly used in retail stores and other settings to prevent the unauthorized removal of goods from a protected area. Typically, a detection system is configured at an exit from the protected area, which comprises one or more transmitters and antennas (“pedestals”) capable of generating an electromagnetic field across the exit, known as the “interrogation zone.” Articles to be protected are tagged with a security tag (such as an RFID and/or an acousto-magnetic (AM) tag), also known as an EAS marker, that, when active, generates a response signal when passed through this interrogation zone. An antenna and receiver in the same or another “pedestal” detects this response signal and generates an alarm.
- In the case of organized retail crime (ORC), an alarm may be insufficient to stop theft of an item. For example, a thief may evade security personnel or law enforcement officers. Further, confronting a thief at the retail location may escalate the situation and possibly put customers at risk.
- In an aspect, the present disclosure provides a security system and methods for tracking tagged items beyond a retail location. Items may be tagged with an active radio tag that is configured to transmit an item identifier and/or location of the item. For example, the active radio tag may utilize short range wireless communications to transmit the item identifier to a mobile communications device, which can forward the information to a database, or the active radio tag may transmit the item identifier to the database via a radio access network. The database may collect item identifiers and location information. The system may display a location of the tracked item, for example, to security personnel or law enforcement officers.
- Referring now to
FIG. 1 , anexample retail location 100 includes multiple regions where tagged products may be located. For example, theretail location 100 may include anopen display area 110, afront end 112,aisles 114, and asecurity room 118.Customers 130 may be located within the different regions.Workers 132 may be stationed at locations such as check out registers and thesecurity room 118. Theworkers 132 may operate a point of sale (POS)system 134. In some implementations, thePOS system 134 may include self-service kiosks or a mobile application. A person of skill in the art would understand that the disclosed systems and methods are applicable to a variety of retail locations and the present disclosure is not limited to the example retail location or areas. - As discussed above, retailers (e.g., consumer products and apparel retailers) have deployed security tags such as radio frequency identification (RFID) systems in stores to track product movements as they arrive at stores, are placed on display on the sales floor, and are sold. By adopting RFID, retailers are able to reduce the amount of time that the store employees spend counting the inventory (e.g., manually counting inventory that is on the floor and in stock room), as well as increase merchandise visibility within each store, thereby enabling shoppers in the store and online to find what they seek. RFID uses radio waves to read and capture information stored on a tag attached to an object such as a good, product, or merchandise. Additionally, RFID tags may be used with a security system to detect inventory changes and possible loss events. For example, RFID tags may be read by an
exit system 140 to determine whether a taggeditem 122 is leaving the retail location. - In an aspect, a tag (e.g., tag 124) can include an
active radio tag 154. Theactive radio tag 154 may be configured to transmit an item identifier and/or location of theactive radio tag 154. The item identifier may be a unique code such as a serial number that identifier theactive radio tag 154. The item identifier may be associated with an item, for example, when the item is tagged. In some implementations, theitem 122 may be tagged with thetag 124 during manufacture or packaging in a process known as source labeling or source tagging. Accordingly, the item identifier and/or tag 124 may be used to track the item throughout a distribution chain. For example, the active radio tag may be configured to transmit the item identifier prior to any unauthorized removal and until deactivated at a point of sale. - The
active radio tag 154 is configured to transmit at least the item identifier via one or more radio technologies. In some implementations, theactive radio tag 154 utilizes a short range wireless communications protocol such as BLUETOOTH, ZIGBEE, FLASHLINQ, WIMEDIA, or WI-FI based on the IEEE 802.11 standard. For instance, theactive radio tag 154 may transmit the item identifier to one or more nearby mobile communications devices or may connect to a wireless local area network (WLAN). In some implementations, theactive radio tag 154 utilizes a radio access network (RAN) or cellular network using, for example, long term evolution (LTE) or new radio (NR) radio technology. For instance, theactive radio tag 154 may connect to a RAN to transmit the item identifier and/or tag location to a database. - The
active radio tag 154 may include apower source 152 and anantenna 156. For example, thepower source 152 may be a battery. In some implementations, thepower source 152 may be charged via energy harvesting from an environment (e.g., solar or RF energy harvesting). In some implementations, theactive radio tag 154 may include an RFID tag 150 (e.g., an electronic article surveillance (EAS) tag). TheRFID tag 150 may be read from up to several feet away by a reader and does not need to be within direct line-of-sight of the reader to be tracked. - An RFID system may be made up of two parts: a tag or label (e.g., RFID tag 150) and a reader (e.g., exit system 140). RFID tags 150 (which may also be referred to as EPC tags or labels) are embedded with an RFID transmitter and a receiver. The RFID component on the tags may include a microchip that stores and processes information, and an antenna to receive and transmit signals. The EPC tag may further contain the specific serial number for each specific object (e.g., an electronic product code (EPC)). The EPC may also be embedded in the
active radio tag 154. For example, in one implementation, thetag 124 may include multiple memory banks such as a reserved memory, EPC memory, tag identification (TID) memory, and user memory. The reserved memory bank may include an access password and a kill password. The EPC memory may include the EPC, a protocol control, and a cyclic redundancy check value. The TID memory may include a tag identification. The user memory may store custom data. - The
POS system 134 may be configured to deactivate atag 124 upon purchase of the taggeditem 122. In some implementations, thePOS system 134 may deactivate thetag 124 itself, for example, using the kill password to prevent thetag 124 from transmitting. In some implementations, thePOS system 134 may deactivate thetag 124 within thesecurity system 102, for example, by setting a status of thetag 124 to deactivated. - To read the information encoded on the
tag 124, a two-way radio transmitter-receiver called an interrogator or reader (e.g., exit system 140) emits a signal to the EPC tag using the antenna (e.g., internal antennas). Theexit system 140 may apply filtering to indicate what memory bank theEPC tag 124 should use to respond to the emitted signal. TheEPC tag 124 may respond with the information (e.g., EPC value or serial number) written in the memory bank. The EPC tag data set may include any information stored on theEPC tag 124 as well as information about reading theEPC tag 124. For example, the EPC tag data set may include: a timestamp, a location, a signal transmission power, a received signal strength indication (RSSI), and an identifier of the RFID reader (e.g., exit system 140). For purposes of this disclosure, the terms, the EPC tag and RFID tag may be used interchangeably. TheEPC tag 124 may be a passive tag or a battery powered EPC tag. A passive RFID tag may use the radio wave energy of the RFID interrogator or receiver to relay the stored information back to the interrogator. In contrast, a battery poweredEPC tag 124 may be embedded with a small battery that powers the relay of information. - The
security system 102 may include anexit system 140 and an item-trackingsystem 160. Theexit system 140 may includemultiple sensors 142 located near exits 144. For example, the exampleretail location 100 may include twoexits 144 that are relatively narrow. Thesensors 142 may be located on each side of theexits 144. For example, in an implementation, thesensors 142 may include at least one RFID reader including an antenna that generates atag detection field 146. Generally, thesensors 142 may be configured (e.g., by setting a power level) such that thetag detection fields 146 cover theexits 144 to detect tags moving through the exits. Although thesensors 142 are illustrated as pedestals adjacent theexits 144,sensors 142 may be located on the floor and/or the ceiling. Thesensors 142 may include additional sensors that may produce measurements other than RF measurements. For example, thesensors 142 may include infrared (IR) sensors, inertial sensors, magnetic sensors, or cameras. - The item-tracking
system 160 may be a computer device programmed to manage tag data based on signals received from thetags 124, thePOS system 134, and theexit system 140. The item-trackingsystem 160 may be, for example, any mobile or fixed computer device including but not limited to a computer server, desktop or laptop or tablet computer, a cellular telephone, a personal digital assistant (PDA), a handheld device, any other computer device having wired and/or wireless connection capability with one or more other devices, or any other type of computerized device. In some implementations, the item-trackingsystem 160 may be located separately from theretail location 100. For example, the item-trackingsystem 160 or component thereof may be hosted on a server or datacenter of a cloud network and communicate with components of thesecurity system 102 at theretail location 100. - The item-tracking
system 160 includes anauthorization component 162 configured to deactivate atag 124 upon purchase of the taggeditem 122. In some implementations, theauthorization component 162 may be configured to detect an unauthorized removal of an item tagged with an active radio tag associated with an item identifier. For instance, theauthorization component 162 may receive a signal from theexit system 140 indicating movement of thetag 124 at an exit system. Theauthorization component 162 may detect unauthorized removal of theitem 122 when theactive radio tag 154 is not deactivated and movement of theactive radio tag 154 is detected. The item-trackingsystem 160 may include anactivation component 164 configured to activate, in response to the unauthorized removal, tracking of the active radio tag. After activation of the tracking, theactive radio tag 154 transmits the item identifier. The item-trackingsystem 160 may include atracking component 166 configured to collect, at a database, the item identifier and location information indicating a location of the item when the item identifier was transmitted. The item-trackingsystem 160 may include adisplay component 168 configured to display the location information from the database for one or more items including the item. For example, the display component may be an application that presents a graphical user interface on a computer display such as a monitor. - Turning to
FIG. 2 , theactive radio tag 154 may transmit at least an identifier of thetag 124 in anenvironment 200 outside of theretail location 100. In some implementations, thetag 124 and/oractive radio tag 154 may include a global positioning system (GPS) receiver configured to determine a location of thetag 124. Theactive radio tag 154 may transmit the location of thetag 124. - In some implementations, the
active radio tag 154 may transmit the item identifier and/or tag location to amobile communications device 210 via a short range communication protocol. For example, themobile communications device 210 may be a mobile phone, tablet, personal computer, laptop computer, etc. In some implementations, for example, themobile communications device 210 may be configured to receive the item identifier and/or tag location from anytag 124. For example, themobile communications device 210 may participate in a Find My Device system. Themobile communications device 210 may receive a message (e.g., via BLUETOOTH) and forward the item identifier and/or tag location to thedatabase 170 via aradio access network 220. In some implementations, themobile communications device 210 may add a location of the mobile device to the item identifier received from theactive radio tag 154. For example, themobile communications device 210 may detect the location based on a global navigational satellite system (GNSS) such as the global positioning system (GPS) or based on local wireless networks. - In some implementations, the
active radio tag 154 may transmit the item identifier and/or tag location to thedatabase 170 via aradio access network 220. For example, theactive radio tag 154 may connect to theradio access network 220 via a base station. Theactive radio tag 154 may transmit an internet protocol (IP) packet including the item identifier and/or tag location to thedatabase 170. In such implementations, theactive radio tag 154 may detect the location based on a GNSS such as GPS or based on local wireless networks and/or access points of theradio access network 220. -
FIG. 3 illustrates anexample configuration 300 of thedatabase 170. Theconfiguration 300 may define a schema for storing tag information for tracking items. For example, theconfiguration 300 may include anitem identifier 310, astatus 312, anitem class 314, avalue 316, andlocation events 318. In some implementations, thelocation events 318 may be a separate structure such as a table that stores atime 320, coordinates 322, andsignal type 324. Theitem identifier 310 may be the unique code stored in the tag 124 (e.g., an EPC code). Thestatus 312 may indicate whether tracking is activated or deactivated for thetag 124. Theitem class 314 may provide information about the item associated with the tag such as a product stock keeping unit (SKU), manufacturer, legal owner, etc. Thevalue 316 may indicate a value of the item such as a monetary value or a value category (e.g., high, medium, low). Eachlocation event 318 may correspond to a transmission from theactive radio tag 154. Thetime 320 may indicate a time that theactive radio tag 154 transmitted theitem identifier 310. Thecoordinates 322 may indicate the location of theactive radio tag 154 at the time of the transmission. In some implementations, thecoordinates 322 may correspond to the location of themobile communications device 210 that received theitem identifier 310 via a short range wireless communication protocol. Thesignal type 324 may indicates how theitem identifier 310 was received (e.g., viamobile communications device 210 or radio access network 220). - Turning to
FIG. 4 , an example item-trackingsystem 160 may be implemented as acomputer device 440 configured to execute an item-trackingapplication 460. Whether thecomputer device 440 is located at theretail location 100 or remotely, thecomputer device 440 may include a central processing unit (CPU) 442 including one or more processors that, individually or in combination, execute instructions stored inmemory 444. For example, theCPU 442 may execute anoperating system 452 and one ormore applications 454, which may include the item-trackingapplication 460. Thecomputer device 440 may include astorage device 446 for storing data (e.g., POS system events and exit system measurements). Thecomputer device 440 may also include anetwork interface 448 for communication with external devices via a network. For example, thecomputer device 440 may communicate with thePOS system 134 and/or theexit system 140. - The
computer device 440 may optionally include a display 450. The display 450 may be, for example, a computer monitor and/or a touch-screen. The display 450 may provide information to an operator and allow the operator to configure thecomputer device 440. -
Memory 444 may be configured for storing data and/or computer-executable instructions defining and/or associated with anoperating system 452 and/orapplication 454, andCPU 442 may executeoperating system 452 and/orapplication 454.Memory 444 may represent one or more hardware memory devices accessible tocomputer device 440. An example ofmemory 444 can include, but is not limited to, a type of memory usable by a computer, such as random access memory (RAM), read only memory (ROM), tapes, magnetic discs, optical discs, volatile memory, non-volatile memory, and any combination thereof.Memory 444 may store local versions of applications being executed byCPU 442. In an implementation, thememory 444 may include a storage device, which may be a non-volatile memory. - The
CPU 442 may include one or more processors for executing instructions. An example ofCPU 442 can include, but is not limited to, any processor specially programmed as described herein, including a controller, microcontroller, application specific integrated circuit (ASIC), field programmable gate array (FPGA), system on chip (SoC), or other programmable logic or state machine. TheCPU 442 may include other processing components such as an arithmetic logic unit (ALU), registers, and a control unit. TheCPU 442 may include multiple cores and may be able to process different sets of instructions and/or data concurrently using the multiple cores to execute multiple threads. - The
operating system 452 may include instructions (such as applications 454) stored inmemory 444 and executable by theCPU 442. Theapplications 454 may include the item-trackingapplication 460 configured to track items that have been removed from theretail location 100 without authorization. - The item-tracking
application 460 may include theauthorization component 162, theactivation component 164, thetracking component 166, and thedisplay component 168. - Turning to
FIG. 5 , anexample method 500 tracks items that have been removed from theretail location 100 without authorization. For example,method 500 may be performed by the item-trackingsystem 160 and/or the item-trackingapplication 460 on thecomputer device 440. Optional blocks are shown with dashed lines. - At
block 510, themethod 500 includes detecting an unauthorized removal of an item tagged with an active radio tag associated with an item identifier. For example, the item-trackingsystem 160 and/or theauthorization component 162 may detect an unauthorized removal of anitem 122 tagged with anactive radio tag 154 associated with anitem identifier 310. In some implementations, theblock 510 may optionally include, atsub-block 512, detecting movement of theactive radio tag 154 at an exit system; and, atsub-block 514, determining that theactive radio tag 154 has not been deactivated. - At
block 520, themethod 500 includes activating, in response to the unauthorized removal, tracking of the active radio tag. After activation of the tracking, theactive radio tag 154 transmits theitem identifier 310. For example, the item-trackingsystem 160 and/or theactivation component 164 may activate, in response to the unauthorized removal, tracking of theactive radio tag 154. In some implementations, atsub-block 522, theblock 520 may optionally include transmitting a request for theactive radio tag 154 to transmit the item identifier and the location information. In some implementations, atsub-block 524, theblock 520 may optionally include adding theitem identifier 310 to a set of tracked items (e.g., in database 170). - At
block 530, themethod 500 includes collecting, at a database, the item identifier and location information indicating a location of the item when the item identifier was transmitted. For example, the item-trackingsystem 160 and/or thetracking component 166 may collect, at thedatabase 170, theitem identifier 310 and location information (e.g., location events 318) indicating a location of the item when the item identifier was transmitted. In some implementations, theactive radio tag 154 is configured to transmit the item identifier to amobile communications device 210 via a short range wireless communications protocol. The item-trackingsystem 160 and/or thetracking component 166 may receive the item identifier from themobile communications device 210. The location information may be a location of themobile communications device 210 provided from the mobile communications device to the database. In some implementations, theactive radio tag 154 is configured to transmit the item identifier to the database via aradio access network 220. - At
block 540, themethod 500 includes displaying the location information from the database for one or more items including the item. For example, the item-trackingsystem 160 and/or thedisplay component 168 may display the location information (e.g., location events 318) from thedatabase 170 for one or more items including theitem 122 on the display 450. In some implementations, atsub-block 542, theblock 540 may optionally include selecting the tag location information from the database based on one or more of: avalue 316 associated with the item identifier; a number of items with location information within a geographic area; or a user selected item. - Referring now to
FIG. 6 , illustrated is anexample computer device 440 in accordance with an implementation, including additional component details as compared toFIG. 4 . In one example,computer device 440 may includeprocessor 48 for carrying out processing functions associated with one or more of components and functions described herein.Processor 48 can include a single or multiple set of processors or multi-core processors. Moreover,processor 48 can be implemented as an integrated processing system and/or a distributed processing system. In an implementation, for example,processor 48 may includeCPU 442. - In an example,
computer device 440 may includememory 50 for storing instructions executable by theprocessor 48 for carrying out the functions described herein. In an implementation, for example,memory 50 may includememory 444. Thememory 50 may include instructions for executing the item-trackingapplication 460. - Further,
computer device 440 may include acommunications component 52 that provides for establishing and maintaining communications with one or more parties utilizing hardware, software, and services as described herein.Communications component 52 may carry communications between components oncomputer device 440, as well as betweencomputer device 440 and external devices, such as devices located across a communications network and/or devices serially or locally connected tocomputer device 440. For example,communications component 52 may include one or more buses, and may further include transmit chain components and receive chain components associated with a transmitter and receiver, respectively, operable for interfacing with external devices. - Additionally,
computer device 440 may include adata store 54, which can be any suitable combination of hardware and/or software, that provides for mass storage of information, databases, and programs employed in connection with implementations described herein. For example,data store 54 may be a data repository foroperating system 452 and/orapplications 454. The data store may includememory 444 and/orstorage device 446. -
Computer device 440 may also include a user interface component 56 operable to receive inputs from a user ofcomputer device 440 and further operable to generate outputs for presentation to the user. User interface component 56 may include one or more input devices, including but not limited to a keyboard, a number pad, a mouse, a touch-sensitive display, a digitizer, a navigation key, a function key, a microphone, a voice recognition component, any other mechanism capable of receiving an input from a user, or any combination thereof. Further, user interface component 56 may include one or more output devices, including but not limited to a display, a speaker, a haptic feedback mechanism, a printer, any other mechanism capable of presenting an output to a user, or any combination thereof. - In an implementation, user interface component 56 may transmit and/or receive messages corresponding to the operation of
operating system 452 and/orapplications 454. In addition,processor 48 may executeoperating system 452 and/orapplications 454, andmemory 50 ordata store 54 may store them. - As used in this application, the terms “component,” “system” and the like are intended to include a computer-related entity, such as but not limited to hardware, firmware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a computer device and the computer device can be a component. One or more components can reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers. In addition, these components can execute from various computer readable media having various data structures stored thereon. The components may communicate by way of local and/or remote processes such as in accordance with a signal having one or more data packets, such as data from one component interacting with another component in a local system, distributed system, and/or across a network such as the Internet with other systems by way of the signal.
- Moreover, the term “or” is intended to mean an inclusive “or” rather than an exclusive “or.” That is, unless specified otherwise, or clear from the context, the phrase “X employs A or B” is intended to mean any of the natural inclusive permutations. That is, the phrase “X employs A or B” is satisfied by any of the following instances: X employs A; X employs B; or X employs both A and B. In addition, the articles “a” and “an” as used in this application and the appended claims should generally be construed to mean “one or more” unless specified otherwise or clear from the context to be directed to a singular form.
- Additional example implementations are described in the following numbered clauses:
- Clause 1. A method comprising: detecting an unauthorized removal of an item tagged with an active radio tag associated with an item identifier; activating, in response to the unauthorized removal, tracking of the active radio tag, wherein after activation of the tracking, the active radio tag transmits the item identifier; collecting, at a database, the item identifier and location information indicating a location of the item when the item identifier was transmitted; and displaying the location information from the database for one or more items including the item.
- Clause 2. The method of clause 1, wherein detecting the unauthorized removal comprises: detecting movement of the active radio tag at an exit system; and determining that the active radio tag has not been deactivated.
- Clause 3. The method of clause 1 or 2, wherein activating tracking of the active radio tag comprises transmitting a request for the active radio tag to transmit the item identifier and the location information.
- Clause 4. The method of any of clauses 1-3, wherein activating tracking of the tag comprises adding the item identifier to a set of tracked items.
- Clause 5. The method of any of clauses 1-4, wherein the active radio tag is configured to transmit the item identifier prior to the unauthorized removal and until deactivated at a point of sale.
- Clause 6. The method of any of clauses 1-5, wherein the active radio tag is configured to transmit the item identifier to a mobile communications device via a short range wireless communications protocol.
- Clause 7. The method of clause 6, wherein the location information is a location of the mobile communications device provided from the mobile communications device to the database.
- Clause 8. The method of any of clauses 1-7 wherein the active radio tag is configured to transmit the item identifier to the database via a radio access network.
- Clause 9. The method of any of clauses 1-8, wherein displaying the tag location information from the database for one or more items including the item comprises selecting the tag location information from the database based on one or more of: a value associated with the item identifier; a number of items with location information within a geographic area; or a user selected item.
- Clause 10. A system comprising: an active radio tag associated with an item identifier and attached to a corresponding item; a point of sale system configured to deactivate the active radio tag in response to a purchase of the corresponding item; an exit system configured to detect the active radio tag within a coverage areas and detect an unauthorized removal of the corresponding item; and at least one computer device including a memory storing computer-executable instructions and a processor configured to execute the computer-executable instructions to: activate, in response to the unauthorized removal, tracking of the active radio tag, wherein after activation of the tracking, the active radio tag transmits the item identifier; collect, at a database, the item identifier and location information indicating a location of the item when the item identifier was transmitted; and display the location information from the database for one or more items including the item.
- Clause 11. The system of clause 10, wherein to detect the unauthorized removal, the at least one computer device is configured to: detect movement of the active radio tag at an exit system; and determine that the active radio tag has not been deactivated.
- Clause 12. The system of clause 10 or 11, wherein to activate tracking of the active radio tag, the at least one computer device is configured to transmit a request for the active radio tag to transmit the item identifier and the location information.
- Clause 13. The system of any of clauses 10-12, wherein to activate tracking of the active radio tag, the at least one computer device is configured to add the item identifier to a set of tracked items.
- Clause 14. The system of any of clauses 10-13, wherein the active radio tag is configured to transmit the item identifier prior to the unauthorized removal and until deactivated at a point of sale.
- Clause 15. The system of any of clauses 10-14, wherein the active radio tag is configured to transmit the item identifier to a mobile communications device via a short range wireless communications protocol.
- Clause 16. The system of clause 15, wherein the location information is a location of the mobile communications device provided from the mobile communications device to the database.
- Clause 17. The system of any of clauses 10-16, wherein the active radio tag is configured to transmit the item identifier to the database via a radio access network.
- Clause 18. The system of any of clauses 10-17, wherein to display the tag location information from the database for one or more items including the item, the at least one computing device is configured to select the tag location information from the database based on one or more of: a value associated with the item identifier; a number of items with location information within a geographic area; or a user selected item.
- Clause 19. A non-transitory computer-readable medium storing computer-executable instructions, that when executed by one or more processors of a computing device, cause the computing device to: detect an unauthorized removal of an item tagged with an active radio tag associated with an item identifier; activate, in response to the unauthorized removal, tracking of the active radio tag, wherein after activation of the tracking, the active radio tag transmits the item identifier; collect, at a database, the item identifier and location information indicating a location of the item when the item identifier was transmitted; and display the location information from the database for one or more items including the item.
- Clause 20. The non-transitory computer-readable medium of clause 19, further comprising instructions to perform the method of any of clauses 2-9.
- Various implementations or features may have been presented in terms of systems that may include a number of devices, components, modules, and the like. A person skilled in the art should understand and appreciate that the various systems may include additional devices, components, modules, etc. and/or may not include all of the devices, components, modules etc. discussed in connection with the figures. A combination of these approaches may also be used.
- The various illustrative logics, logical blocks, and actions of methods described in connection with the embodiments disclosed herein may be implemented or performed with a specially-programmed one of a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general-purpose processor may be a microprocessor, but, in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computer devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration. Additionally, at least one processor may comprise one or more components operable to perform one or more of the steps and/or actions described above.
- Further, the steps and/or actions of a method or procedure described in connection with the implementations disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, a hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium may be coupled to the processor, such that the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. Further, in some implementations, the processor and the storage medium may reside in an ASIC. Additionally, the ASIC may reside in a user terminal. In the alternative, the processor and the storage medium may reside as discrete components in a user terminal. Additionally, in some implementations, the steps and/or actions of a method or procedure may reside as one or any combination or set of codes and/or instructions on a machine readable medium and/or computer readable medium, which may be incorporated into a computer program product.
- In one or more implementations, the functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored or transmitted as one or more instructions or code on a computer-readable medium. Computer-readable media includes computer storage media. Non-transitory computer-readable media excludes transitory signals. A storage medium may be any available media that can be accessed by a computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Disk and disc, as used herein, includes compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk and Blu-ray disc where disks usually reproduce data magnetically, while discs usually reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
- While implementations of the present disclosure have been described in connection with examples thereof, it will be understood by those skilled in the art that variations and modifications of the implementations described above may be made without departing from the scope hereof. Other implementations will be apparent to those skilled in the art from a consideration of the specification or from a practice in accordance with examples disclosed herein.
Claims (20)
1. A method comprising:
detecting an unauthorized removal of an item tagged with an active radio tag associated with an item identifier;
activating, in response to the unauthorized removal, tracking of the active radio tag, wherein after activation of the tracking, the active radio tag transmits the item identifier;
collecting, at a database, the item identifier and location information indicating a location of the item when the item identifier was transmitted; and
displaying the location information from the database for one or more items including the item.
2. The method of claim 1 , wherein detecting the unauthorized removal comprises:
detecting movement of the active radio tag at an exit system; and
determining that the active radio tag has not been deactivated.
3. The method of claim 1 , wherein activating tracking of the active radio tag comprises transmitting a request for the active radio tag to transmit the item identifier and the location information.
4. The method of claim 1 , wherein activating tracking of the active radio tag comprises adding the item identifier to a set of tracked items.
5. The method of claim 1 , wherein the active radio tag is configured to transmit the item identifier prior to the unauthorized removal and until deactivated at a point of sale.
6. The method of claim 1 , wherein the active radio tag is configured to transmit the item identifier to a mobile communications device via a short range wireless communications protocol.
7. The method of claim 6 , wherein the location information is a location of the mobile communications device provided from the mobile communications device to the database.
8. The method of claim 1 , wherein the active radio tag is configured to transmit the item identifier to the database via a radio access network.
9. The method of claim 1 , wherein displaying the location information from the database for one or more items including the item comprises selecting the location information from the database based on one or more of: a value associated with the item identifier; a number of items with location information within a geographic area; or a user selected item.
10. A system comprising:
an active radio tag associated with an item identifier and attached to a corresponding item;
a point of sale system configured to deactivate the active radio tag in response to a purchase of the corresponding item;
an exit system configured to detect the active radio tag within a coverage areas and detect an unauthorized removal of the corresponding item; and
at least one computer device including a memory storing computer-executable instructions and one or more processors, individually or in combination, configured to execute the computer-executable instructions to:
activate, in response to the unauthorized removal, tracking of the active radio tag, wherein after activation of the tracking, the active radio tag transmits the item identifier;
collect, at a database, the item identifier and location information indicating a location of the item when the item identifier was transmitted; and
display the location information from the database for one or more items including the item.
11. The system of claim 10 , wherein to detect the unauthorized removal, the at least one computer device is configured to:
detect movement of the active radio tag at the exit system; and
determine that the active radio tag has not been deactivated.
12. The system of claim 10 , wherein to activate tracking of the active radio tag, the at least one computer device is configured to transmit a request for the active radio tag to transmit the item identifier and the location information.
13. The system of claim 10 , wherein to activate tracking of the active radio tag, the at least one computer device is configured to add the item identifier to a set of tracked items.
14. The system of claim 10 , wherein the active radio tag is configured to transmit the item identifier prior to the unauthorized removal and until deactivated at a point of sale.
15. The system of claim 10 , wherein the active radio tag is configured to transmit the item identifier to a mobile communications device via a short range wireless communications protocol.
16. The system of claim 15 , wherein the location information is a location of the mobile communications device provided from the mobile communications device to the database.
17. The system of claim 10 , wherein the active radio tag is configured to transmit the item identifier to the database via a radio access network.
18. The system of claim 10 , wherein to display the location information from the database for one or more items including the item, the at least one computer device is configured to select the location information from the database based on one or more of: a value associated with the item identifier; a number of items with location information within a geographic area; or a user selected item.
19. A non-transitory computer-readable medium storing computer-executable instructions, that when executed by one or more processors of a computer device, cause the computer device to:
detect an unauthorized removal of an item tagged with an active radio tag associated with an item identifier;
activate, in response to the unauthorized removal, tracking of the active radio tag, wherein after activation of the tracking, the active radio tag transmits the item identifier;
collect, at a database, the item identifier and location information indicating a location of the item when the item identifier was transmitted; and
display the location information from the database for one or more items including the item.
20. The non-transitory computer-readable medium of claim 19 , further comprising instructions to select the location information from the database based on one or more of: a value associated with the item identifier; a number of items with location information within a geographic area; or a user selected item.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/407,940 US20240242582A1 (en) | 2023-01-13 | 2024-01-09 | Methods and systems for tracking an anti-theft tag beyond the retail space |
PCT/US2024/011376 WO2024151935A1 (en) | 2023-01-13 | 2024-01-12 | Methods and systems for tracking an anti-theft tag beyond the retail space |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US202363479887P | 2023-01-13 | 2023-01-13 | |
US18/407,940 US20240242582A1 (en) | 2023-01-13 | 2024-01-09 | Methods and systems for tracking an anti-theft tag beyond the retail space |
Publications (1)
Publication Number | Publication Date |
---|---|
US20240242582A1 true US20240242582A1 (en) | 2024-07-18 |
Family
ID=91854851
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/407,940 Pending US20240242582A1 (en) | 2023-01-13 | 2024-01-09 | Methods and systems for tracking an anti-theft tag beyond the retail space |
Country Status (1)
Country | Link |
---|---|
US (1) | US20240242582A1 (en) |
-
2024
- 2024-01-09 US US18/407,940 patent/US20240242582A1/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11756394B2 (en) | Wireless tracking system for merchandise security | |
US9924244B2 (en) | Systems and methods for detecting patterns in spatio-temporal data collected using an RFID system | |
US11704986B2 (en) | System and method for foil detection using millimeter wave for retail applications | |
US20120322380A1 (en) | Localized tracking of items with electronic labels | |
US10078947B2 (en) | Control tag with environmentally selected conditional response | |
US10997381B2 (en) | Systems and methods for using radio frequency identification as an adaptive alarm threshold | |
US11450197B2 (en) | Apparatus and method of controlling a security system | |
EP4038593A1 (en) | Validating radio frequency identification (rfid) alarm event tags | |
US12080136B2 (en) | Transition zone RFID tag management | |
US11611872B2 (en) | Methods and systems for a self-provisioning device | |
US9396425B1 (en) | Systems and methods for locating objects using RFID technology and alerting mechanisms | |
US11568160B2 (en) | Methods and systems for classifying tag status in a retail environment | |
US11067683B2 (en) | Systems and methods for locating items within a facility | |
US20240242582A1 (en) | Methods and systems for tracking an anti-theft tag beyond the retail space | |
US11735019B2 (en) | System and method for increased exit interrogation of RFID tags | |
WO2024151935A1 (en) | Methods and systems for tracking an anti-theft tag beyond the retail space | |
CN105718828A (en) | Security Tag Alerting For Continuous Movement | |
US20240320452A1 (en) | Methods and systems for reducing jamming between tag readers |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SENSORMATIC ELECTRONICS, LLC, FLORIDA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PEREZ, SERGIO M.;BERGMAN, ADAM;SIGNING DATES FROM 20230721 TO 20230724;REEL/FRAME:066085/0149 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |